Search Results
Angler
17 posts
Searching for Java, MSN 7, Windows 8 etc on Google Can Lead You to Malware
Researchers at an IT security company Heimdal Security have discovered a number of compromised web pages ranked on…
October 24, 2015
Windows Registry now Providing Shelter to Destructive Kovter Malware
Kovter Trojan can hide in Windows registry and does not need to be stored on the computer’s hard…
September 30, 2015
Yahoo Ad Network Hacked, Infecting Millions of Devices with Malware, Ransomware
Yahoo ad network has been exploited by a group of hackers that resulted in a serving of malware…
August 5, 2015
TeslaCrypt looks like AlphaCrypt Malware uses TOR to transfer ransomware
AlphaCrypt Crypto-Malware the actual mind blower is that it Looks like TeslaCrypt and acts like CryptoWall. the latest…
May 12, 2015
18-year-old Vulnerability Lets Attackers Steal Data From All Versions of Windows
Researcher Aaron Spangler identified a bug in Internet Explorer back in 1997. This flaw allowed stealing of user…
April 14, 2015
Famous Games Hijacked for Ransom Through TeslaCrypt Ransomware
Files of over 20 Games Encrypted by TeslaCrypt Ransomware – Out of 185, 50 file extensions are game-oriented. TeslaCrypt…
March 15, 2015
New Adobe Flash 0-Day Using Dailymotion.com In Malvertising Campaign
Adobe Flash Player has again seen a zero-day exploit that has appeared in the field due to a critical vulnerability that enables drive-by-download attacks. The U.S seems to be teeming with a malvertising-based attack having its foundations on the exploit.
February 4, 2015